F5 devices are vulnerable per Qualys' active detection, but F5 engineers have confirmed that it is not exploitable. If you have validated that the device being flagged is, in fact, an F5 device you can ignore the vulnerability or submit for a PCI Exception."